Skip to main content

ssh mitm server for security audits supporting publickey authentication, session hijacking and file manipulation

Reason this release was yanked:

Installation is broken because of missing dependencies

Project description


SSH-MITM - ssh audits made simple

SSH-MITM intercepting password login

ssh man-in-the-middle (ssh-mitm) server for security audits supporting
publickey authentication, session hijacking and file manipulation

Get it from the Snap Store

Contributors

Table of Contents

Introduction

Downloads CodeFactor Documentation Status GitHub PRs Welcome Join the chat at https://gitter.im/ssh-mitm/ssh-mitm

SSH-MITM is a man in the middle SSH Server for security audits and malware analysis.

Password and publickey authentication are supported and SSH-MITM is able to detect, if a user is able to login with publickey authentication on the remote server. This allows SSH-MITM to accept the same key as the destination server. If publickey authentication is not possible, the authentication will fall back to password-authentication.

When publickey authentication is possible, a forwarded agent is needed to login to the remote server. In cases, when no agent was forwarded, SSH-MITM can rediredt the session to a honeypot.

(back to top)

Features

  • publickey authentication
  • hijacking and logging of terminal sessions
  • store and replace files during SCP/SFTP file transferes
  • port porwarding
    • SOCKS 4/5 support for dynamic port forwarding
  • intercept MOSH connections
  • audit clients against known vulnerabilities
  • plugin support

(back to top)

Installation

SSH-MITM can be installed as a Ubuntu Snap, PIP-Package, AppImage, Nix and even runs on Android devices

# install ssh-mitm as snap package
$ sudo snap install ssh-mitm

# install ssh-mitm as python pip package
$ python3 -m pip install ssh-mitm

# install as Nix package
$ nix-env -iA nixos.ssh-mitm

(back to top)

Quickstart

To start SSH-MITM, all you have to do is run this command in your terminal of choice.

$ ssh-mitm server --remote-host 192.168.0.x

Now let's try to connect. SSH-MITM is listening on port 10022.

$ ssh -p 10022 testuser@proxyserver

You will see the credentials in the log output.

INFO     Remote authentication succeeded
    Remote Address: 127.0.0.1:22
    Username: testuser
    Password: secret
    Agent: no agent

(back to top)

Session hijacking

Getting the plain text credentials is only half the fun. When a client connects, the ssh-mitm starts a new server, which is used for session hijacking.

INFO     ℹ created mirrorshell on port 34463. connect with: ssh -p 34463 127.0.0.1

To hijack the session, you can use your favorite ssh client.

$ ssh -p 34463 127.0.0.1

Try to execute somme commands in the hijacked session or in the original session.

The output will be shown in both sessions.

(back to top)

Phishing FIDO Tokens

SSH-MITM is able to phish FIDO2 Tokens which can be used for 2 factor authentication.

The attack is called trivial authentication (CVE-2021-36367, CVE-2021-36368) and can be enabled with the command line argument --enable-trivial-auth.

ssh-mitm server --enable-trivial-auth

Using the trivial authentication attack does not break password authentication, because the attack is only performed when a publickey login is possible.

Video explaining the phishing attack:
Click to view video on vimeo.com
Click to view video on vimeo.com

Downlaod presentation slides

(back to top)

Contributing

Contributions are what make the open source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.

If you have a suggestion that would make this better, please fork the repo and create a pull request. You can also simply open an issue with the tag "enhancement". Don't forget to give the project a star! Thanks again!

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

See also the list of contributors who participated in this project.

(back to top)

Contact

(back to top)

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ssh-mitm-3.0.0.tar.gz (75.4 kB view details)

Uploaded Source

Built Distribution

ssh_mitm-3.0.0-py3-none-any.whl (95.2 kB view details)

Uploaded Python 3

File details

Details for the file ssh-mitm-3.0.0.tar.gz.

File metadata

  • Download URL: ssh-mitm-3.0.0.tar.gz
  • Upload date:
  • Size: 75.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.1

File hashes

Hashes for ssh-mitm-3.0.0.tar.gz
Algorithm Hash digest
SHA256 c84d0e6e2e1375488cd6401bbc64e3f59a6aa5a740b7ef4bb2bb0de5aa50dc27
MD5 a40ad1a733c771ed7097fd3d5bcab027
BLAKE2b-256 071dec6b87fd5689dcbc33e8c37fb702e26f69884f669b4cc6d7eed5be474db0

See more details on using hashes here.

File details

Details for the file ssh_mitm-3.0.0-py3-none-any.whl.

File metadata

  • Download URL: ssh_mitm-3.0.0-py3-none-any.whl
  • Upload date:
  • Size: 95.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.1

File hashes

Hashes for ssh_mitm-3.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 4f8fd7dce75bb0eff1e1dc85e13cb7fc80b7ab85139a7d9363156d5892accdb4
MD5 c1b36e63c63fc8e575e922ca75dcc39a
BLAKE2b-256 0b6fcb99da3ef8cf63b7e94f776bb0fcefcdfcc1dc442095342dcd1398bdfa16

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page